CVE-2021-3999

high

Description

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

References

https://www.tenable.com/cyber-exposure/tenable-2022-threat-landscape-report

https://www.openwall.com/lists/oss-security/2022/01/24/4

https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e

https://sourceware.org/bugzilla/show_bug.cgi?id=28769

https://security.netapp.com/advisory/ntap-20221104-0001/

https://security-tracker.debian.org/tracker/CVE-2021-3999

https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html

https://bugzilla.redhat.com/show_bug.cgi?id=2024637

https://access.redhat.com/security/cve/CVE-2021-3999

Details

Source: Mitre, NVD

Published: 2022-08-24

Updated: 2023-02-12

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High